gcloud kms import-jobs create - create a new import job
gcloud kms import-jobs create IMPORT_JOB --import-method=IMPORT_METHOD --protection-level=PROTECTION_LEVEL [--keyring=KEYRING] [--location=LOCATION] [GCLOUD_WIDE_FLAG ...]
Creates a new import job within the given keyring.
The following command creates a new import job named 'strider' within the 'fellowship' keyring, and 'us-central1' location:
$ gcloud kms import-jobs create strider --location=us-central1 \ --keyring=fellowship \ --import-method=rsa-oaep-3072-sha256-aes-256 \ --protection-level=hsm
- IMPORT_JOB
Name of the import job to create.
- --import-method=IMPORT_METHOD
The wrapping method to be used for incoming key material. For more information about choosing an import method, see https://cloud.google.com/kms/docs/key-wrapping. IMPORT_METHOD must be one of: rsa-oaep-3072-sha1-aes-256, rsa-oaep-3072-sha256, rsa-oaep-3072-sha256-aes-256, rsa-oaep-4096-sha1-aes-256, rsa-oaep-4096-sha256, rsa-oaep-4096-sha256-aes-256.
- --protection-level=PROTECTION_LEVEL
Protection level of the import job. PROTECTION_LEVEL must be one of: software, hsm.
- --keyring=KEYRING
Key ring of the import job.
- --location=LOCATION
Location of the import job.
These flags are available to all commands: --access-token-file, --account, --billing-project, --configuration, --flags-file, --flatten, --format, --help, --impersonate-service-account, --log-http, --project, --quiet, --trace-token, --user-output-enabled, --verbosity.
Run $ gcloud help for details.
These variants are also available:
$ gcloud alpha kms import-jobs create
$ gcloud beta kms import-jobs create